Canonical snapd before version 2.37.1 incorrectly performed socket owner validation, allowing an malicious user to run arbitrary commands as root. This issue affects: Canonical snapd versions before 2.37.1.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
canonical snapd |
||
canonical ubuntu linux 14.04 |
||
canonical ubuntu linux 16.04 |
||
canonical ubuntu linux 18.04 |
||
canonical ubuntu linux 18.10 |
Get an update, or risk giving a dodgy user or malware an upgrade Linux Mint 18.3: A breath of fresh air? Well, it's a step into the unGNOME
Canonical has issued an update for Ubuntu to address a security vulnerability that can be exploited by malware and rogue users to gain root access. As this bug affects desktop and server editions of the Linux distro, this is an irritating flaw for folks using shared systems, such as labs or offices of workstations. Chris Moberly gets credit for the discovery and reporting of the flaw in question, CVE-2019-7304, which is an elevation-of-privilege vulnerability present in Ubuntu versions prior to ...